Security in Computing, Third Edition
Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer...
Core JSTL: Mastering the JSP™ Standard Tag Library
Using JSTL, software developers and Web page authors can create robust, flexible Web applications more quickly and easily than ever before. Now, best-selling author and JSTL expert David Geary presents the definitive guide to JSTL: its built-in tags, powerful expression language, and extensibility. Through practical examples...
UNIX® User's Handbook, Second Edition
UNIX end-users desperately need an up-to-date reference guide with real depth: one that teaches UNIX commands and doesn't just list them! In UNIX User's Handbook, second edition, best-selling UNIX author Marty Poniatowski covers every topic UNIX users need to master-with exceptional clarity...
UNIX® Shells by Example, Third Edition
Five UNIX shells, three essential utilities, one indispensable resource!
Learn UNIX shell programming the easy way, using hands-on examples
Covers all five leading UNIX shells-C, Bourne, Korn, bash, and tcsh
|Result Page: 61 60 59 58 57 56 55 54 53 52 51 |